CIS Logo
tagline: Confidence in the Connected World


This security update resolves a vulnerability in Microsoft Windows.



A vulnerability has been discovered in Microsoft Windows Journal, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Windows, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Office, the most severe of which could allow for remote code execution if a user opens a specially crafted Microsoft Office file.



Multiple vulnerabilities have been discovered in Microsoft Jscript and VBScript engines that could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft Edge that could allow for remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Internet Explorer.



Multiple vulnerabilities in Adobe Acrobat and Adobe Reader could allow for remote code execution.



Multiple vulnerabilities have been discovered in OpenSSL, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution.



President Barack Obama signed the Cybersecurity Information Sharing Act of 2015 (CISA) into law on December 18, 2015. Learn about the details here.


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code, with failed exploit attempts potentially leading to denial of service conditions.



Learn about the underlying assumptions IoT devices make, common methods they utilize to communicate, and what type of information is at risk.


Malvertising
April 28, 2016
Malvertising, or malicious advertising, is the use of online, malicious advertisements to spread malware and compromise systems.


1 90 91 92 93 94 108